Int. J. of Internet Technology and Secured Transactions   »   2010 Vol.2, No.3/4

 

 

Title: Secure unicast and multicast over satellite DVB using chaotic generators

 

Author: Daniel Caragata, Safwan El Assad, Hassan Noura, Ion Tutanescu

 

Addresses:
Ecole Polytechnique of the University of Nantes, Rue Christian Pauc, BP 50609, 44306, Nantes, France; Department of Electronics, Communications and Computing, University of Pitesti, Targul din Vale Str., No. 1, Postal Code 110040, Pitesti, Arges, Romania.
Ecole Polytechnique of the University of Nantes, Rue Christian Pauc, BP 50609, 44306, Nantes, France.
Ecole Polytechnique of the University of Nantes, Rue Christian Pauc, BP 50609, 44306, Nantes, France.
Department of Electronics, Communications and Computing, University of Pitesti, Targul din Vale Str., No. 1, Postal Code 110040, Pitesti, Arges, Romania

 

Abstract: Today's communication technology research is characterised by a powerful 'all IP' trend. There is already a strong internet backbone in place that has the capacity to offer high quality services to the most users. However, in some cases, the 'last mile' problem remains to be solved and one of the possibilities to resolve this problem is the satellite digital video broadcasting (DVB). This paper proposes a security upgrade for IP communications over satellite DVB that is suited for the characteristics of satellite communications and that offers support for both unicast and multicast communications. The usage of chaotic functions is proposed both for the generation of new keys and for the encryption of data. We propose the use of a strong chaotic key generator and of a robust encryption algorithm, which have been previously studied, to enhance the properties of the system. They offer strong cryptographic properties and low computational requirements.

 

Keywords: chaotic functions; DVB-RCS; DVB-S; DVB-S2; information security; IP communications; multicasting; satellite communications; digital video broadcasting; satellite DVB; data encryption; key generation; cryptography.

 

DOI: 10.1504/IJITST.2010.037409

 

Int. J. of Internet Technology and Secured Transactions, 2010 Vol.2, No.3/4, pp.357 - 379

 

Available online: 06 Dec 2010

 

 

Editors Full text accessPurchase this articleComment on this article